General
-
Target
file.exe
-
Size
275KB
-
Sample
241125-lzglfaxlbq
-
MD5
0abcf5f274cf19c6f9c75954e9b6a182
-
SHA1
e39e1cecaffce08ffd9388ded9e13132e1eb6d51
-
SHA256
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156
-
SHA512
c61dc07371b03d9a959ff7caac8265eea345fa78e4939d0a4d9491ef879287046ec6e0847b4067c3043fb97f4c1f94c2ac0f5bbc9ba18716ef6e02a4268f02fd
-
SSDEEP
6144:dh0ZpFC4sffny7TuLBdZlT4DIJYdy3F8ioyrN:dh0ZpFCfB3TGyYy3uiBZ
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
11.8
fc02efe1cfb2a62f36f33fff0274fb41
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Targets
-
-
Target
file.exe
-
Size
275KB
-
MD5
0abcf5f274cf19c6f9c75954e9b6a182
-
SHA1
e39e1cecaffce08ffd9388ded9e13132e1eb6d51
-
SHA256
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156
-
SHA512
c61dc07371b03d9a959ff7caac8265eea345fa78e4939d0a4d9491ef879287046ec6e0847b4067c3043fb97f4c1f94c2ac0f5bbc9ba18716ef6e02a4268f02fd
-
SSDEEP
6144:dh0ZpFC4sffny7TuLBdZlT4DIJYdy3F8ioyrN:dh0ZpFCfB3TGyYy3uiBZ
-
Detect Vidar Stealer
-
Stealc family
-
Vidar family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-